-
-
Notifications
You must be signed in to change notification settings - Fork 5k
Closed as not planned
Labels
Description
What happened?
Any internal_user_viewer user can GET /user/list, which returns the password field for all users including admins.
Although this field may be hashed by SHA256, an attacker can directly use this to log into the UI, as implemented in login.
This is definitely a vulnerability but I will just post it here since it is too trivial for anyone to find.
Other endpoints such as /user/info also return the password field, so we'd better fix them as well.
Relevant log output
N/AAre you a ML Ops Team?
Yes
What LiteLLM version are you on ?
main
Twitter / LinkedIn details
No response